First published: Wed May 21 2008(Updated: )
Multiple buffer overflows in xdr functions in the server in CA BrightStor ARCServe Backup 11.0, 11.1, and 11.5 allow remote attackers to execute arbitrary code, as demonstrated by a stack-based buffer overflow via a long parameter to the xdr_rwsstring function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CA ARCserve Backup for Laptops and Desktops | =11.0 | |
Broadcom ARCserve Backup | =11.5 | |
Broadcom ARCserve Backup | =11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2242 is considered critical due to its ability to allow remote attackers to execute arbitrary code.
To fix CVE-2008-2242, you should upgrade to a patched version of CA BrightStor ARCServe Backup that addresses the buffer overflow vulnerabilities.
CVE-2008-2242 affects CA BrightStor ARCServe Backup versions 11.0, 11.1, and 11.5.
Yes, CVE-2008-2242 can be exploited remotely by sending specially crafted parameters to the vulnerable xdr functions.
CVE-2008-2242 is classified as a buffer overflow vulnerability.